Emails: Reduce the attack surface and protect sensitive data

Reduce the attack surface for emails and protect sensitive data

Share post

Most cyberattacks start with an email. That's why Varonis Systems is expanding its Microsoft 365 offering and improving the protection of the cloud-based email service Microsoft Exchange Online.

It is estimated that 91 percent of cyberattacks begin via email. Mailboxes contain a lot of sensitive data that can easily fall into the wrong hands without the right protection.

AI increases the threat

Despite being the source of some of the largest data breaches, email remains a blind spot for many companies. Artificial intelligence further exacerbates the threat situation as Microsoft 365 Copilot and other generative AI tools use user permissions to scan emails. Therefore, companies need to reduce email access using a least-privilege approach.

Support through automated email security

Varonis helps security teams proactively reduce the email attack surface, stop data exfiltration, and mitigate generative AI risks with accurate and automated email security, enabling customers to:

  • Identify mailboxes that are accessible to guest and external users and others.
  • Limit and monitor access to sensitive mailboxes and calendars.
  • Detect and report data breaches or improper handling of data.
  • Verify the effectiveness of data loss protection policies and quickly remediate gaps.
  • Conduct security investigations with a detailed audit trail of all email activity (sending, receiving, deleting, etc.).
  • Automatically respond to abnormal email activity that could indicate data exfiltration and other email-based attacks or abuse.

Reduce email-based cyber incidents

“An effective Data Security Posture Management (DSPM) strategy must also include email,” explains Brian Vecci, Field CTO at Varonis. “Varonis scans millions of emails, assigns mailbox permissions and monitors activity. This allows our customers to dramatically reduce the likelihood of an email-based data incident using the same cloud-native platform they use to secure data across SaaS, IaaS and hybrid clouds.”

Varonis for Microsoft 365 installs in just minutes and protects data in OneDrive, SharePoint Online, Exchange Online, and Teams.

More at Varonis.com

 


About Varonis

Since its founding in 2005, Varonis has taken a different approach than most IT security providers by placing company data stored both locally and in the cloud at the center of its security strategy: sensitive files and e-mails, confidential customer, patient and Employee data, financial data, strategy and product plans and other intellectual property. The Varonis data security platform (DSP) detects insider threats and cyber attacks through the analysis of data, account activities, telemetry and user behavior, prevents or limits data security breaches by locking sensitive, regulated and outdated data and maintains a secure state of the systems through efficient automation .,


Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more